Learn Hacking/Penetration Testing using Android From Scratch

If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often s...

  • All levels
  • English

Course Description

If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often seen as someone who performs illegal intrusions into a computing system to steal money and/or information from the owner for their own gains. However, there is also some thing known as Ethical Hacking....

If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often seen as someone who performs illegal intrusions into a computing system to steal money and/or information from the owner for their own gains. However, there is also some thing known as Ethical Hacking. This hacking, also known as penetration testing, isn’t done illegally, but rather done by companies or developers to ensure that their system’s security is sound.

What you’ll learn
  • Preparing – In this section, you will learn how to prepare your system for penetration testing, including downloading and setting up NetHunter and Kali Linux
  • Information Gathering – In this section, you will learn how to gather relevant information that you would require for hacking, such as WiFi networks, how to map your current networking, displaying connected devices, information about IP address, MAC address, open ports, running programs. You will also learn how to connect n external wireless card to your Android device and prepare it to be used to crack WiFi keys.
  • Spying – You will learn how to become MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. You will also learn how to create a fake access point and spy on all the data sent on it.
  • Exploitation – In this section, you will look at different exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computer. You will also learn how to bypass on OSX and Windows login screens. You will also learn how to create an undetectable backdoor and deliver it to the target computer by replacing files that the target machine downloads or backdooring the downloaded files on the fly.
  • Detection & Protection – You will learn three methods to detect ARP Poisoning Attacks, how to use Wiresharks. You will also learn how to protect against these MITM attacks and prevent them from happening. Finally, you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.

Covering Topics

1
Section 1 : Introduction

2
Section 2 : Weaponizing

3
Section 3 : Installing Kali Linux As Virtual Machine (Optional)

4
Section 4 : Information Gathering

5
Section 5 : Spying

6
Section 6 : Spying > MITM Method 1 - Bad USB Attack

7
Section 7 : Spying > MITM Method 2 - ARP Poisonning

8
Section 8 : Spying > MITM Method 3 - Fake Access Point (Honey Pot)

9
Section 9 : Detection & Protection

10
Section 10 : Exploitation (Gaining Access)

11
Section 11 : Exploitation - Rubber Ducky Scripts

12
Section 12 : Detecting Malicious Files

Curriculum

      Section 1 : Introduction
    1
    Intro
      Section 2 : Weaponizing
    2
    Preparing Your Android Device Preview
    3
    NetHunter Preview and Lab Overview
      Section 3 : Installing Kali Linux As Virtual Machine (Optional)
    4
    Installing Kali 2017 As a Virtual Machine Preview
    5
    Basic Overview of The Operating System
      Section 4 : Information Gathering
    6
    Discovering Wireless Networks - Wardriving
    7
    Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2
    8
    Network Mapping - Discovering Devices Connected To The Network
    9
    Network Mapping - Discovering Open Ports
    10
    Network Mapping - Discoverig Installed Services
      Section 5 : Spying
    11
    Introduction Preview
    12
    MITM (Man In The Middle) Methods
      Section 6 : Spying > MITM Method 1 - Bad USB Attack
    13
    What Is The Bad USB Attack & How To Launch It
    14
    Sniffing Data & Capturing Passwords
    15
    Bypassing HTTPS
    16
    DNS Spoofing
      Section 7 : Spying > MITM Method 2 - ARP Poisonning
    17
    What Is ARP Poisoning
    18
    ARP Poisoning & Sniffing Data Using arpspoof
    19
    ARP Poisoning & Sniffing Data Using Zanti2
    20
    Intercepting Downloaded Files
    21
    Replacing Images & Injecting Javascript Code
      Section 8 : Spying > MITM Method 3 - Fake Access Point (Honey Pot)
    22
    Fake Access Point Theory
    23
    Configuring Access Point Settings
    24
    Launching The Fake Access Point
    25
    Sniffing Data Sent Over The Access Point
      Section 9 : Detection & Protection
    26
    Detecting ARP Poisoning Attacks
    27
    Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
      Section 10 : Exploitation (Gaining Access)
    28
    Introduction
    29
    Bypassing Windows/OSX Logins - Setup
    30
    Bypassing Windows/OSX Logins
    31
    Creating An Undetectable Backdoor
    32
    Using Metasploit Meterpreter
    33
    Replacing Downloadeds With A Backdoor
    34
    Backdooring Downloads On The Fly
    35
    HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB
    36
    HID Keyboard Attack - Gaining Full Control Over Windows Machine
      Section 11 : Exploitation - Rubber Ducky Scripts
    37
    What Are Rubber Ducky Scripts & How To Use Them
    38
    Automatic Download & Execute To Gain Full Control Over Windows
    39
    Reverse OSX Shell To Gain Full Control Over Mac OSX Computers
    40
    Reverse Linux Shell To Gain Full Control Over Linux Computers
      Section 12 : Detecting Malicious Files
    41
    Protecting Yourself Against Backdoor Delivery Methods
    42
    Detecting Undetectable Backdoors

Frequently Asked Questions

It is an online tutorial that covers a specific part of a topic in several sections. An Expert teaches the students with theoretical knowledge as well as with practical examples which makes it easy for students to understand.

A Course helps the user understand a specific part of a concept. While a path and E-Degrees are broader aspects and help the user understand more than just a small area of the concept.

A Course will help you understand any particular topic. For instance, if you are a beginner and want to learn about the basics of any topic in a fluent manner within a short period of time, a Course would be best for you to choose.

We have an inbuilt question-answer system to help you with your queries. Our support staff will be answering all your questions regarding the content of the Course.